It's not uncommon for Pastebin and other sites to host stolen or hacked data on users and high-profile people. But what about on the 'hidden' Internet? Can ignorance be bliss?
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Researchers have found that Windows 8 code contains security check code absent in Windows 7. This is not the same as not patching.
After finding an operator manual online, two Winnipeg teens stumbled onto a case of unforgivably poor security operations by a bank.
A new flaw allows any hands-on hacker to access iPhones and iPads where the user previously left off, including email, settings, and other apps.
The U.S. government relies on intelligence from an unknown number of U.S. telecoms for its mass surveillance programs. What's the state of phone privacy in the post-NSA world?
Two of the seven are for at least one critical vulnerability. One of these affects an unusually broad collection of products.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
[UPDATED] Still cleaning up after the Heartbleed debacle, OpenSSL is issuing fixes for several vulnerabilities, one of them exploitable to run arbitrary code on the client or server.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
Believe it or not, most states have some provisions for allowing people to vote over the Internet. The pressure is on to expand it, even though a secure online voting system is impossible using today's technology.